the reasons are the same as for sbrk. unlike sbrk, there is no safe usage because brk does not return any useful information, so it should just fail unconditionally.
@@ -1,6 +1,7 @@
+#include <errno.h>
#include "syscall.h"
int brk(void *end)
{
- return -(syscall(SYS_brk, end) != (unsigned long)end);
+ return __syscall_ret(-ENOMEM);
}